Fundamental Points of the ABScard Technology
|
|
- Rodger Weaver
- 8 years ago
- Views:
Transcription
1 Fundamental Points of the ABScard Technology Architettura ABSCARD Pagina 1 di 13
2 General Index 1.Architecture Introduction Security Management ABScard enterprise version Verticalizations System Architecture Presentation Identification Application Database ABScard Function Diagram Installation Prerequisites Hardware Prerequisites Prerequisiti Software...13 Architettura ABSCARD Pagina 2 di 13
3 1.Architecture 1.1 Introduction ABScard is a transactional system developed with multi-tier technology, in order to guarantee a high degree of separation between the data and the presentation of the data. The use of Java language and TCP/IP protocol allows the system to be implemented through various types of servers (Windows, Linux, UNIX, etc.) The possibility to host the database on servers with high levels of security and performance (ex. Mainframe IBM, UNIX servers, Windows servers) along with its modular architecture make the ABScard able to carry out an elevated number of transactions per second. The ABScard system is multichannel, and the system is able to elaborate transactions coming from: Internet : interfaced through a browser. POS terminals and/or smart-card reader terminals: on hardware using ABScard software Hand-held devices/smartphone Self-Service terminals Mobile Phones: transactions formatted through GSM messages Thanks to the capacity to run transactions through POS terminals and mobile phones, ABScard extends the benefits of an innovative transactional system to traditional circuits. ABScard is the ideal solution for: Payment systems Customer loyalty and point accumulation systems Authentication systems Electronic ticket offices Municipal ID cards for citizens Online betting Mobile phone recharge or debit card recharge Architettura ABSCARD Pagina 3 di 13
4 1.1.1 Security The security of the transactions is one of the principle characteristics of the system, on the internet channel ABScard makes use of the most recent technology available today. The transaction data are encrypted with symmetric public key algorithms and authentification. The encrypting algorithm used in this version of the software is rijndael, which has been certified by NIST (National Institute of Standard and Technology, USA) as well as the new AES (Advanced Encription Standard). In addition, the session keys have a duration limited to the transaction, making any brute force attack, besides practically impossible, also inconsequential (the session key changes constantly). Further security is provided by strong-authentication which confirms the reciprocal authentication between the server application and the client. This provides protection against attacks using pirate-applet mecchanisms. On the POS channel, the ABScard protocal allows for various levels of security, from clear transmission to transaction encryption using banking standards. Architettura ABSCARD Pagina 4 di 13
5 1.1.2 Management The system management is done through software modules with internet browser type interfacing. This allows the installation of work units to be as simplified as possible. Security is guaranteed by a system of personized access, which selectively authorizes the access to management functions. In addition, every operation is performed by the server with a transaction, which guarantees the security and registration of all activity. The management transactions all the following type of operations to be performed: Back-Office o Management of system tables o Batch elaborations o Pre-established queries o Dynamic queries o Management of internal security profiles o Management of Retailers Help-desk o Card Management o Merchant Management o Client terminal management (ex. POS) o Operator profile management Through the configuration files it is possible to personalize the menus and queries, in order to rapidly and independently personalize/verticalize the system. Architettura ABSCARD Pagina 5 di 13
6 1.1.3 ABScard enterprise version Verticalizations The enterprise version of the ABScard server allows the system to be integrated and/or personalized. The following are possible: Advanced integration with external informative structures (ex. Gateway/Service Providers) Perform user application. New transactions (Java language) able to expand the current functions of the system or to create new applications. The user transactions allow enterprise applications to be created rapidly, taking advantage of the architeture of a system that is transactional, scalable and multi-platform. Enterprise functions are available even on ABScard certified client platforms (ex. POS), which allow a great flexibility in the implementation of new transacions or the personalization of existing ones. Architettura ABSCARD Pagina 6 di 13
7 1.2 System Architecture The system is structured in four levels or tiers, each single level performs a specific system function. The levels are defined as follows: Presentation Identification Application Database The separation into multiple levels allows the system to be installed making the best use of the hardware architecture, which has been conceptualized according to the highest possible security levels. The transactions are developed using the concept of channels, which allows for a versatile system respect to the transmissive channel, that is interfaced only on the Presentation level. The relationship between levels is represented by the following diagram: Presentation I dentification Application Database Figure 1. Architettura ABSCARD Pagina 7 di 13
8 1.2.1 Presentation The presentation level is performed by one or more servers specialized in the channel function (gateway server) from which the transactions are received. The task of the presentation level is to carry out all of the specific functions of a determined channel and to streamline communication with the successive levels. On the internet channel, the function is performed through a web-server, which must support the execution of active pages (typically JSP) and be able to recall Java classes. The execution of the transactions does not require any application to be installed; the interfacing is done through an internet browser. The applied logic of the presentation is done through Java applet. On the POS channel, the presentation function is performed by a POS gateway server, which interfaces with the periferical communication devices towards the POS terminals. The execution of the transactions takes place through POS terminal, or hardware devices with smart-card readers, that have the client-pos ABScard software installed. The terminals connect to the server through one of the typical means of communication, such as a dedicated telephone line, a LAN/GPRS connection or serial connection. The concentration is done either by concentration device hardware or by service providers (ex. TNS). The server acts as the gateway towards the identification level. On the Mobile channel, the presentation function is performed by a GSM gateway server, that is able to communicate with devices or channels of transmission/reception of SMS messages towards the SMS service provider. The execution of the transaction takes place through telephones, typically mobile telephones, able to send SMS messages. The use of TCP protocol and encryption allows the presentation level to be geographically distributed in respect to the server applications. Architettura ABSCARD Pagina 8 di 13
9 1.2.2 Identification The identification level is implemented by one or more specialized server applications (called Identification Servers). Cyphering/deciphering the transactions Transaction identification Proxing of the transactions applied on one or more application server The function of proxing allows the transaction load to be distributed to multiple applied servers. Therefore, it is possible to specialize the servers for transaction groups. For volumes of elevated transactions, this function can be integrated with hardware devices for traffic balancing, that allows for the creation of redundant architecture at a high level of service Application The application level is implemented by one or more server applications. The server communicates with the identification level and normally accesses data by communicating with the database level by way of multiple connections (connection pool). An application server (APS) carries out the following functions: Syntactical check of the transactions Elaboration of the transactions Composition of the reply Registration (logging) Database The database level is implemented using a relational type database. The DBMS, to be compatible with the ABScard server, must be able to support SQL transactions and multiple connections via DJBC connections. Architettura ABSCARD Pagina 9 di 13
10 1.3 ABScard Function Diagram The following diagram shows the flow of a generic transaction coming from different clients. Protocol Converter HW or Protocol Converter Provider PTSN/GPRS POS Gateway ABScard Telephone Recharge (Jastfin) TCP/IP WebServer Gateway Application/ Identification Server ABScard Bet Providers Bank (acquirer Visa) Gateway GSM ABScard Database TCP/IP GSM PROVI DER Client Tier Service Delivery Center ABS Service Provider Tier Figure 2. Architettura ABSCARD Pagina 10 di 13
11 The elevated versatility allows the activation of a congruous number of servers for elevated transactional loads, or to concentrate the identification and application functions on a sole server. The separation of the protocol from the transactions (based on XML) and the presentation level allows for the modification of existing interfaces or the implementation of new communication channels, leaving the application server architecture unchanged. Architettura ABSCARD Pagina 11 di 13
12 1.4 Installation Prerequisites Hardware Prerequisites The ABScard system was developed to be independent from the hardware platform. It can be installed on a variable number of servers depending on the transactional volume that the system must support. The communication through TCP/IP Protocol, limited to the ports used, must be allowed between the servers that host the system and that are separate from systems of a hardware or software type. The number and the strength of the servers on which the system is installed is based on the transactional volume that must be guaranteed, from the access channel and also from the type of the transactions themselves. The web server, given the limited space on the disk and the elaborative load required by the system, does not require any particular strength. It is, however, necessary to adequately size the internet access keeping in mind the average dimensions of the pages (especially those containging applet) and the number of simultaneous connections that must be guaranteed. The Identification Server, having the highest elaborative load due to encryption, must be characterized by an adequate power in CPU. A multiprocessor server is often necessary, also to guarantee adequate transaction response times. The Application Server does not have specific characteristics, being above all the most easily expandible level (thanks to the transaction balancing function of the identification server). It can be flanked by other servers if necessary. The database server obviously requires characteristics regarding reliability in terms of data storage. Architettura ABSCARD Pagina 12 di 13
13 1.4.2 Prerequisiti Software Component Software Platform Notes Identification Server Multiplatform Requires Java Runtime 1.4 or higher. Application Server Multiplatform Requires Java Runtime 1.4 or higher. POS Server Multiplatform Requires Java Runtime 1.4 or higher. Database Multiplatform Certified with Microsoft SQL Server, MySQL, Oracle. Requires database with JDBC interface. Gateway Internet Multiplatform Requires WEB Server compatibile con JSP o ASP Gateway GSM Multiplatform Requires Java Runtime and specific interface with SMS carrier Helpdesk/backoffice via WEB Helpdesk/backoffice Client Multiplatform Multiplatform Requires WEB Server JSP or ASP compatible Requires Java Runtime 1.4 or higher. Architettura ABSCARD Pagina 13 di 13
All Business Solutions s.r.l. P.IVA 03645370283 www.abscard.com. Sede Legale Via Ripamonti, n.89 20141 Milano Tel. +39 2.36504272 Fax. +39 2.
The ABScard system is the most innovative solution of its kind on the market for its services of customer loyalty and payment methods to supplement traditional banking services. All Business Solutions
More informationClient/server is a network architecture that divides functions into client and server
Page 1 A. Title Client/Server Technology B. Introduction Client/server is a network architecture that divides functions into client and server subsystems, with standard communication methods to facilitate
More informationSecure web transactions system
Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends
More informationInformation and Communications Technology Courses at a Glance
Information and Communications Technology Courses at a Glance Level 1 Courses ICT121 Introduction to Computer Systems Architecture This is an introductory course on the architecture of modern computer
More informationITG Software Engineering
IBM WebSphere Administration 8.5 Course ID: Page 1 Last Updated 12/15/2014 WebSphere Administration 8.5 Course Overview: This 5 Day course will cover the administration and configuration of WebSphere 8.5.
More informationPremium Server Client Software
Premium Server Client Software Server / Client SMSPro & GSMS TH series Get the tools on hand Premium Server is designed to cover most of the applications in the market. It gives a hassle free management
More informationSMPP Gateway. Whitepaper. Whitepaper AGOSTO 2009. www.iquall.net/mensajeria_smppgateway.html
Whitepaper Whitepaper AGOSTO 2009 www.iquall.net/mensajeria_smppgateway.html SMPP Introduce yourself in the SMS World without being an expert in the field of telecommunication. Use your actual platforms
More informationExhibit B5b South Dakota. Vendor Questions COTS Software Set
Appendix C Vendor Questions Anything t Applicable should be marked NA. Vendor Questions COTS Software Set Infrastructure 1. Typically the State of South Dakota prefers to host all systems. In the event
More informationDB2 Connect for NT and the Microsoft Windows NT Load Balancing Service
DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service Achieving Scalability and High Availability Abstract DB2 Connect Enterprise Edition for Windows NT provides fast and robust connectivity
More informationLOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS
LOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS Venkat Perumal IT Convergence Introduction Any application server based on a certain CPU, memory and other configurations
More informationPurpose... 3. Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations... 7. Data Encryption...
Contents Purpose... 3 Background on Keyscan Software... 3 Client... 4 Communication Service... 4 SQL Server 2012 Express... 4 Aurora Optional Software Modules... 5 Computer Hardware Configurations... 6
More informationS y s t e m A r c h i t e c t u r e
S y s t e m A r c h i t e c t u r e V e r s i o n 5. 0 Page 1 Enterprise etime automates and streamlines the management, collection, and distribution of employee hours, and eliminates the use of manual
More informationMEGA Web Application Architecture Overview MEGA 2009 SP4
Revised: September 2, 2010 Created: March 31, 2010 Author: Jérôme Horber CONTENTS Summary This document describes the system requirements and possible deployment architectures for MEGA Web Application.
More informationA framework for web-based product data management using J2EE
Int J Adv Manuf Technol (2004) 24: 847 852 DOI 10.1007/s00170-003-1697-8 ORIGINAL ARTICLE M.Y. Huang Y.J. Lin Hu Xu A framework for web-based product data management using J2EE Received: 8 October 2002
More informationOracle Net Services for Oracle10g. An Oracle White Paper May 2005
Oracle Net Services for Oracle10g An Oracle White Paper May 2005 Oracle Net Services INTRODUCTION Oracle Database 10g is the first database designed for enterprise grid computing, the most flexible and
More informationAPIS IT d.o.o. Fiscalization technical aspects
APIS IT d.o.o. Fiscalization technical aspects Project overview April 2012. Project inception 14.6.2012. Conceptual design 26.7.2012. Proposal of Fiscalization Law 2.8.2012. Solution presentation 1.10.2012.
More informationDBMS Infrastructures and IT Career Recommendations. Jeff Fineberg November 21, 2011
DBMS Infrastructures and IT Career Recommendations Jeff Fineberg November 21, 2011 Topics Importance of Databases Security Computing Environments / Infrastructures Methodologies for Data access Database
More informationAn Oracle White Paper July 2011. Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide
Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide An Oracle White Paper July 2011 1 Disclaimer The following is intended to outline our general product direction.
More informationArchitecture Guidelines Application Security
Executive Summary These guidelines describe best practice for application security for 2 or 3 tier web-based applications. It covers the use of common security mechanisms including Authentication, Authorisation
More informationStock Trader System. Architecture Description
Stock Trader System Architecture Description Michael Stevens mike@mestevens.com http://www.mestevens.com Table of Contents 1. Purpose of Document 2 2. System Synopsis 2 3. Current Situation and Environment
More informationVersion 14.0. Overview. Business value
PRODUCT SHEET CA Datacom Server CA Datacom Server Version 14.0 CA Datacom Server provides web applications and other distributed applications with open access to CA Datacom /DB Version 14.0 data by providing
More informationFlexible, Innovative POS and Store Inventory Management Solution
SOLUTION BLUEPRINT RETAIL Flexible, Innovative POS and Store Inventory Management Solution Industry Retail Business Challenge Improving retail services while reducing operations expenses Technology Solution
More informationAlliance Key Manager Solution Brief
Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major
More informationAttachment D System Hardware & Software Overview & Recommendations For IRP System
Attachment D System Hardware & Software Overview & Recommendations For IRP System Submitted by Explore Information Services, LLC Table of Contents Table of Contents...2 Explore IRP Configuration Recommendations...3
More informationORACLE DATABASE 10G ENTERPRISE EDITION
ORACLE DATABASE 10G ENTERPRISE EDITION OVERVIEW Oracle Database 10g Enterprise Edition is ideal for enterprises that ENTERPRISE EDITION For enterprises of any size For databases up to 8 Exabytes in size.
More informationTitle Page. Hosted Payment Page Guide ACI Commerce Gateway
Title Page Hosted Payment Page Guide ACI Commerce Gateway Copyright Information 2008 by All rights reserved. All information contained in this documentation, as well as the software described in it, is
More information3-Tier Architecture. 3-Tier Architecture. Prepared By. Channu Kambalyal. Page 1 of 19
3-Tier Architecture Prepared By Channu Kambalyal Page 1 of 19 Table of Contents 1.0 Traditional Host Systems... 3 2.0 Distributed Systems... 4 3.0 Client/Server Model... 5 4.0 Distributed Client/Server
More information.CRF. Electronic Data Capture and Workflow System for Clinical Trials
.CRF Electronic Data Capture and Workflow System for Clinical Trials Business challenge Most research takes place in different centers simultaneously. These are often located in different cities or even
More informationDigi Connectware Manager:
Digi Connectware Manager: Dynamic IP Address Support White Paper Abstract In the world of TCP/IP, each network device receives an identifier called an IP address. Unfortunately, there are a finite number
More informationData Replication in Privileged Credential Vaults
Data Replication in Privileged Credential Vaults 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Background: Securing Privileged Accounts 2 2 The Business Challenge 3 3 Solution Approaches
More informationSnow Agent System Pilot Deployment version
Pilot Deployment version Security policy Revision: 1.0 Authors: Per Atle Bakkevoll, Johan Gustav Bellika, Lars, Taridzo Chomutare Page 1 of 8 Date of issue 03.07.2009 Revision history: Issue Details Who
More informationExploring Oracle E-Business Suite Load Balancing Options. Venkat Perumal IT Convergence
Exploring Oracle E-Business Suite Load Balancing Options Venkat Perumal IT Convergence Objectives Overview of 11i load balancing techniques Load balancing architecture Scenarios to implement Load Balancing
More informationEquipment Room Database and Web-Based Inventory Management
Equipment Room Database and Web-Based Inventory Management Project Proposal Sean M. DonCarlos Ryan Learned Advisors: Dr. James H. Irwin Dr. Aleksander Malinowski December 12, 2002 TABLE OF CONTENTS Project
More informationAxapta Object Server MICROSOFT BUSINESS SOLUTIONS AXAPTA
MICROSOFT BUSINESS SOLUTIONS AXAPTA Axapta Object Server Microsoft Business Solutions Axapta Object Server minimises bandwidth requirements and ensures easy, efficient and homogeneous client deployment.
More informationBase One's Rich Client Architecture
Base One's Rich Client Architecture Base One provides a unique approach for developing Internet-enabled applications, combining both efficiency and ease of programming through its "Rich Client" architecture.
More informationBusinessObjects Enterprise XI Release 2 Administrator s Guide
BusinessObjects Enterprise XI Release 2 Administrator s Guide BusinessObjects Enterprise XI Release 2 1 Patents Trademarks Copyright Third-party contributors Business Objects owns the following U.S. patents,
More informationA GENERIC ARCHITECTURE FOR WEB APPLICATIONS TO SUPPORT THREAT ANALYSIS OF INFRASTRUCTURAL COMPONENTS
A GENERIC ARCHITECTURE FOR WEB APPLICATIONS TO SUPPORT THREAT ANALYSIS OF INFRASTRUCTURAL COMPONENTS Lieven Desmet, Bart Jacobs, Frank Piessens, and Wouter Joosen DistriNet Research Group, Katholieke Universiteit
More informationinforouter V8.0 Server & Client Requirements
inforouter V8.0 Server & Client Requirements Please review this document thoroughly before proceeding with the installation of inforouter Version 8. This document describes the minimum and recommended
More informationWeb. Studio. Visual Studio. iseries. Studio. The universal development platform applied to corporate strategy. Adelia. www.hardis.
Web Studio Visual Studio iseries Studio The universal development platform applied to corporate strategy Adelia www.hardis.com The choice of a CASE tool does not only depend on the quality of the offer
More informationMonitoring Traffic manager
Monitoring Traffic manager eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced
More informationDell and JBoss just work Inventory Management Clustering System on JBoss Enterprise Middleware
Dell and JBoss just work Inventory Management Clustering System on JBoss Enterprise Middleware 2 Executive Summary 2 JBoss Enterprise Middleware 5 JBoss/Dell Inventory Management 5 Architecture 6 Benefits
More informationAuditMatic Enterprise Edition Installation Specifications
Enterprise Edition Installation Specifications Version: 4.0 Copyright 2005 F.A.S., Inc. All rights reserved. Copyright 2008 F.A.S., Inc. All rights reserved. Copyright Notice Information contained in this
More information2012 LABVANTAGE Solutions, Inc. All Rights Reserved.
LABVANTAGE Architecture 2012 LABVANTAGE Solutions, Inc. All Rights Reserved. DOCUMENT PURPOSE AND SCOPE This document provides an overview of the LABVANTAGE hardware and software architecture. It is written
More informationTechniques for Scaling Components of Web Application
, March 12-14, 2014, Hong Kong Techniques for Scaling Components of Web Application Ademola Adenubi, Olanrewaju Lewis, Bolanle Abimbola Abstract Every organisation is exploring the enormous benefits of
More information1 Product. Open Text is the leading fax server vendor in the world. *
1 Product Open Text Fax s Replace fax machines and inefficient paper processes with efficient and secure computer-based faxing and electronic document delivery Open Text is the leading fax server vendor
More informationCertified E-commerce Consultant (CEC)
Certified E-commerce Consultant (CEC) Syllabus Copyright This is intellectual property of ACTA S.A. and it is protected by Greek and European legislation concerning copyright. The creation of a copy of
More informationData Backup and Restore (DBR) Overview... 2. Detailed Description... 3. Pricing... 5 SLAs... 5 Service Matrix... 6. Service Description
Service Description Data Backup and Restore (DBR) Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable.
More informationExecutive summary. Table of Contents. Benefits of an integration platform. Technical paper Infor Cloverleaf Integration Suite
Technical paper Infor Cloverleaf Integration Suite Executive summary Many hospitals struggle with managing the increasing amounts of information coming from multiple data sources. Not only can it be difficult
More informationSystem requirements. Java SE Runtime Environment(JRE) 7 (32bit) Java SE Runtime Environment(JRE) 6 (64bit) Java SE Runtime Environment(JRE) 7 (64bit)
Hitachi Solutions Geographical Information System Client Below conditions are system requirements for Hitachi Solutions Geographical Information System Client. 1/5 Hitachi Solutions Geographical Information
More informationSoftware design (Cont.)
Package diagrams Architectural styles Software design (Cont.) Design modelling technique: Package Diagrams Package: A module containing any number of classes Packages can be nested arbitrarily E.g.: Java
More informationDesigning a Microsoft SQL Server 2005 Infrastructure
Course Outline Other Information MS 2786 Days 2 Starting Time 9:00 Finish Time 4:30 Lunch & refreshments are included with this course. Designing a Microsoft SQL Server 2005 Infrastructure Introduction
More informationHigh Availability Implementation for JD Edwards EnterpriseOne
High Availability Implementation for JD Edwards EnterpriseOne Ken Yeh, Manager, ERP Systems/JDE Enersource Colin Dawes, Director of Technology Services, Syntax Presentation Abstract Enersource Corporation
More informationDatabase FAQs - SQL Server
Database FAQs - SQL Server Kony Platform Release 5.0 Copyright 2013 by Kony, Inc. All rights reserved. August, 2013 This document contains information proprietary to Kony, Inc., is bound by the Kony license
More informationChapter 1 - Web Server Management and Cluster Topology
Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management
More informationFull-scale Online Event Ticketing System The Design and Implementation
ABSTRACT Full-scale Online Event Ticketing System The Design and Implementation The paper analyzed the system requirements for online shopping in general and specific requirements for event ticket online
More informationhttp://support.oracle.com/
Oracle Primavera Contract Management 14.0 Sizing Guide October 2012 Legal Notices Oracle Primavera Oracle Primavera Contract Management 14.0 Sizing Guide Copyright 1997, 2012, Oracle and/or its affiliates.
More informationCA Identity Manager. Installation Guide (WebLogic) r12.5 SP8
CA Identity Manager Installation Guide (WebLogic) r12.5 SP8 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationDevelopment of Open Source RESTful WHOIS. Haikuo Zhang
Development of Open Source RESTful WHOIS Haikuo Zhang Why We Need a New WHOIS Protocol WHOIS Protocol (RFC 3912) has problems WHOIS has never been internationalized WHOIS was defined for ASCII only WHOIS
More informationAA Automated Attendant is a device connected to voice mail systems that answers and may route incoming calls or inquiries.
CRM Glossary Guide AA Automated Attendant is a device connected to voice mail systems that answers and may route incoming calls or inquiries. ABANDON RATE Abandon Rate refers to the percentage of phone
More informationTier Architectures. Kathleen Durant CS 3200
Tier Architectures Kathleen Durant CS 3200 1 Supporting Architectures for DBMS Over the years there have been many different hardware configurations to support database systems Some are outdated others
More informationRequirement Priority Name Requirement Text Response Comment
N-Tiered Architecture Accessibility Application architecture shall consist of a minimum of four tiers: proxy, presentation, application, and data [base]. Each of the fours tiers shall be separated with
More informationContents Introduction... 5 Deployment Considerations... 9 Deployment Architectures... 11
Oracle Primavera Contract Management 14.1 Sizing Guide July 2014 Contents Introduction... 5 Contract Management Database Server... 5 Requirements of the Contract Management Web and Application Servers...
More informationTransformation of POS Operations at
Transformation of POS Operations at Retail Outlets for Australian Telco Abstract A leading Australian telecommunications service provider wanted to upgrade its Point of Sale (POS) operations at its retail
More informationSoftware. Quidview 56 CAMS 57. XLog NTAS 58
Software Quidview 56 CAMS 57 XLog NTAS 58 55 Quidview Quidview Network Management System Quidview network management software is a suite of scalable tools for simplifying the network management and maintenance.
More informationPROGRESS DATADIRECT QA AND PERFORMANCE TESTING EXTENSIVE TESTING ENSURES DATA CONNECTIVITY THAT WORKS
Progress DataDirect Connect DATA SHEET PROGRESS DATADIRECT QA AND PERFORMANCE TESTING EXTENSIVE TESTING ENSURES DATA CONNECTIVITY THAT WORKS Progress DataDirect ODBC, JDBC and ADO.NET data connectivity
More informationTop 7 Tips for Better Business Continuity
Top 7 Tips for Better Business Continuity With Hosted Fax www.biscom.com sales@biscom.com (+1) 800-477-2472 or (+1) 978-250-1800 Introduction Biscom s Secure File Transfer (Biscom SFT) solution enables
More informationIT Architecture Review. ISACA Conference Fall 2003
IT Architecture Review ISACA Conference Fall 2003 Table of Contents Introduction Business Drivers Overview of Tiered Architecture IT Architecture Review Why review IT architecture How to conduct IT architecture
More informationDesign of Electronic Medical Record System Based on Cloud Computing Technology
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.5, May 2014, pp. 4010 ~ 4017 DOI: http://dx.doi.org/10.11591/telkomnika.v12i5.4392 4010 Design of Electronic Medical Record System Based
More informationSystem Requirements. Version 2015.0
System Requirements Version 2015.0 Copyright Copyright 2000-2015, NICE s.r.l. All right reserved. We'd Like to Hear from You You can help us make this document better by telling us what you think of the
More informationImplementing the Application Control Engine Service Module
Course: Implementing the Application Control Engine Service Module Duration: 4 Day Hands-On Lab & Lecture Course Price: $ 2,995.00 Learning Credits: 30 Hitachi HiPass: 4 Description: Implementing the Application
More informationActiveXperts Network Monitor. White Paper
ActiveXperts Network Monitor Centralized monitoring of Windows, Novell, Linux and Unix servers White Paper 2008, ActiveXperts Software B.V. This document is written by ActiveXperts Software B.V. and represents
More informationLync SHIELD Product Suite
Lync SHIELD Product Suite The Natural Solution For Securing Lync Connectivity For today s mobile enterprise, the need to connect smartphones to the corporate network has become a vital business requirement.
More informationData Sheet. NCP Secure Enterprise Management. General description. Highlights
Data Sheet NCP Secure Enterprise Management General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access technology with integrated RADIUS server
More informationKonyOne Server Prerequisites _ MS SQL Server
KonyOne Server Prerequisites _ MS SQL Server KonyOne Platform Release 5.0 Copyright 2012-2013 Kony Solutions, Inc. All Rights Reserved. Page 1 of 13 Copyright 2012-2013 by Kony Solutions, Inc. All rights
More informationNETWORK MONITORING & ALERTING SERVICES SERVICE DEFINITION
NETWORK MONITORING & ALERTING SERVICES Complete IT Support for Business Westgate IT Network Monitoring & Alerting Services: Service Definition Service Name Network Monitoring & Alerting Services Overview
More informationAlliance AES Encryption for IBM i Solution Brief
Encryption & Tokenization Alliance AES Encryption for IBM i Solution Brief A Complete AES Encryption Solution Alliance AES Encryption for IBM i provides AES encryption for sensitive data everywhere it
More informationTable of Contents. Introduction. Audience. At Course Completion
Table of Contents Introduction Audience At Course Completion Prerequisites Microsoft Certified Professional Exams Student Materials Course Outline Introduction This three-day instructor-led course provides
More informationPerfect (ASD) Point of Sales (POS)
Perfect (ASD) Point of Sales (POS) ASD POS is a comprehensive Point of Sale (POS) solution for fast-paced, high-volume, multi-site retail operations. Whether you need to manage a single retail location,
More informationDJIGZO EMAIL ENCRYPTION. Djigzo white paper
DJIGZO EMAIL ENCRYPTION Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or
More informationNCP Secure Enterprise Management Next Generation Network Access Technology
Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access
More informationPhire Architect Hardware and Software Requirements
Phire Architect Hardware and Software Requirements Copyright 2014, Phire. All rights reserved. The Programs (which include both the software and documentation) contain proprietary information; they are
More informationRelease: 1. ICADBS601A Build a data warehouse
Release: 1 ICADBS601A Build a data warehouse ICADBS601A Build a data warehouse Modification History Release Release 1 Comments This Unit first released with ICA11 Information and Communications Technology
More informationEclectic Computing. Time Tracking Tool Software Architecture Document. Version <1.3>
Eclectic Computing Time Tracking Tool Version Revision History Date Version Description Author 7/Mar/05 1.0 Documentation of high-level architecture. David Janzen 7/Apr/05 1.1 Architecture at end
More informationHow To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm
ULTEO OPEN VIRTUAL DESKTOP V4.0.2 ARCHITECTURE OVERVIEW Contents 1 Introduction 2 2 Servers Roles 3 2.1 Session Manager................................. 3 2.2 Application Server................................
More informationCredit Card Processing Overview
CardControl 3.0 Credit Card Processing Overview Overview Credit card processing is a very complex and important system for anyone that sells goods. This guide will hopefully help educate and inform new
More informationOracle Identity Analytics Architecture. An Oracle White Paper July 2010
Oracle Identity Analytics Architecture An Oracle White Paper July 2010 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may
More informationWeb-based gambling and sports betting system 2011. Requirement specification
Web-based gambling and sports betting system 2011. Requirement specification CONTENTS 1. Objective of the system... 3 2. Business and functional requirements... 3 2.1. Player registration and players'
More informationNetwork device management solution
iw Management Console Network device management solution iw MANAGEMENT CONSOLE Scalability. Reliability. Real-time communications. Productivity. Network efficiency. You demand it from your ERP systems
More informationArchitecture and Mode of Operation
Open Source Scheduler Architecture and Mode of Operation http://jobscheduler.sourceforge.net Contents Components Platforms & Databases Architecture Configuration Deployment Distributed Processing Security
More informationWeb and e-business Technologies
ActivePotato Corporation www.activepotato.com Web and e-business Technologies By Rohit Chugh rohit.chugh@activepotato.com For the IEEE Ottawa Chapter June 2, 2003 2003 by Rohit Chugh 1 Agenda Web Technologies
More informationeticketing Architecture Overview
Group eticketing Architecture Overview The purpose of this document is to provide Ticket Office management with an introduction to eticketing service capabilities. With the uptake of ecommerce on the Internet,
More informationOVERVIEW. CEP Cluster Server is Ideal For: First-time users who want to make applications highly available
Phone: (603)883-7979 sales@cepoint.com Cepoint Cluster Server CEP Cluster Server turnkey system. ENTERPRISE HIGH AVAILABILITY, High performance and very reliable Super Computing Solution for heterogeneous
More informationSysAidTM Product Description
SysAidTM Product Description September 2006 IT Challenges As the ratio of computers to IT staff grows, so does the visibility of the IT department in organizations. Efficiency and responsiveness has become
More informationInstallation Guide. SAP Control Center 3.3
Installation Guide SAP Control Center 3.3 DOCUMENT ID: DC01002-01-0330-01 LAST REVISED: November 2013 Copyright 2013 by SAP AG or an SAP affiliate company. All rights reserved. No part of this publication
More informationSSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN
1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10
More informationGuardium Change Auditing System (CAS)
Guardium Change Auditing System (CAS) Highlights. Tracks all changes that can affect the security of database environments outside the scope of the database engine Complements Guardium's Database Activity
More informationSAP NetWeaver 7.0 - Application Server architecture
SAP NetWeaver 7.0 - Application Server architecture 1. Introduction The purpose of this document is to explain what components are part of the SAP NetWeaver Application Server and to explain in details
More informationChapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
More informationACI Card and Merchant ManagementTM solutions overview
PRODUCT LINE BROCHURE ACI Card and Merchant ManagementTM solutions overview Comprehensive credit, debit, smart card and prepaid card management End-to-end merchant account management and settlement Management
More information<Insert Picture Here> Move to Oracle Database with Oracle SQL Developer Migrations
Move to Oracle Database with Oracle SQL Developer Migrations The following is intended to outline our general product direction. It is intended for information purposes only, and
More information